Authentication and Authorization Models

Free registration required

Executive Summary

In computer science distributed systems could be more secured with a distributed trust model based on either PKI or kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due to different actual trust mechanism and security policy as well as the intrinsic flaw of each trust model. Since internet has been used commonly in information systems technologies, many applications need some security capabilities to protect against threats to the communication of information. Two critical procedures of these capabilities are authentication and authorization.

  • Format: PDF
  • Size: 128.88 KB